1
by Bosworth, Seymour
Published 2009
John Wiley & Sons
Table of Contents: ...Ethical decision making and high technology / James Landon Linderman -- Security policy guidelines...

2
by Berling, Trine Villumsen
Published 2022
Taylor & Francis
Subjects: ...security logics...

3
by Vellani, Karim H.
Published 2007
Butterworth-Heinemann
Table of Contents: ...Chapter 1: Data Driven Security -- Chapter 2: Asset Identification and Security Inventory...

4
by Dal Lago, Alessandro
Published 2010
Taylor & Francis
Subjects: ...critical security...

5
by Duncan, Jane
Published 2022
Bloomsbury Academic
Subjects: ... Constitutional and administrative law: general::LNDH Government powers...

6
by Carey, Mathew
Published 1829
s.n
Subjects: ...United States / Politics and government...

7
by Calder, Alan
Published 2010
IT Governance Pub.
Table of Contents: ... SECURITY GOVERNANCE; CHAPTER 13: THE PROPOSAL; CHAPTER 14: HANDLING OBJECTIONS...

8
by Watson, Scott A.
Published 2007
Syngress
Table of Contents: ... intelligence -- The art of war and homeland security...

9
by Landoll, Douglas J.
Published 2011
CRC Press
Table of Contents: ...1. Introduction -- 2. Information security risk assessment basics -- 3. Project definition -- 4...

11
by Young, Carl S.
Published 2010
Syngress/Elsevier
Table of Contents: ...Part I -- The Structure and Function of Security Risk -- Chapter 1 -- Security Threats and Risk...

12
by Speed, Tyler Justin
Published 2012
CRC Press
Table of Contents: ...Ch. 1. Creating a culture of security awareness -- ch. 2. Overview of security awareness categories...

13
by Murphy, Sean P.
Published 2015
McGraw-Hill Education
Table of Contents: ... -- Information security and privacy events management -- Part II: Healthcare Information Privacy and Security...

14
Published 2003
Auerbach Publications
Table of Contents: ...1. Introduction to Assets Protection -- 2. Security Vulnerability -- 3. Structural Barriers -- 4...

15
by Kairab, Sudhanshu
Published 2005
Auerbach Publications
Table of Contents: ...Chapter 1 Introduction -- chapter 2 Introduction -- chapter 3 What Is an Information Security...

16
by Ajmani, Neelesh, Kumar, Dinesh
Published 2017
Apress
Table of Contents: ...Chapter 1: Current Practices -- Chapter 2: Next Practices: Business Centric Security and Risk...

17
by Ermoshina, Ksenia
Published 2022
Mattering Press
...It does so by examining how different solutions of cryptography for secure communications...

18
by Ermoshina, Ksenia
Published 2022
Mattering Press
...It does so by examining how different solutions of cryptography for secure communications...

19
by Hossain, Kamrul
Published 2018
Taylor & Francis
Subjects: ...Human Security...

20
by Burges, Dan
Published 2013
Butterworth-Heinemann
Table of Contents: ... impact of cargo theft -- Determining risk -- Roles and responsibilities -- Physical security...